CN102426690A - Method for secretly sharing and restoring digital image - Google Patents

Method for secretly sharing and restoring digital image Download PDF

Info

Publication number
CN102426690A
CN102426690A CN201110216491XA CN201110216491A CN102426690A CN 102426690 A CN102426690 A CN 102426690A CN 201110216491X A CN201110216491X A CN 201110216491XA CN 201110216491 A CN201110216491 A CN 201110216491A CN 102426690 A CN102426690 A CN 102426690A
Authority
CN
China
Prior art keywords
image
secret
digital picture
width
cloth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110216491XA
Other languages
Chinese (zh)
Other versions
CN102426690B (en
Inventor
唐聃
舒红平
方佳嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu University of Information Technology
Original Assignee
Chengdu Information Technology Co Ltd of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Information Technology Co Ltd of CAS filed Critical Chengdu Information Technology Co Ltd of CAS
Priority to CN 201110216491 priority Critical patent/CN102426690B/en
Publication of CN102426690A publication Critical patent/CN102426690A/en
Application granted granted Critical
Publication of CN102426690B publication Critical patent/CN102426690B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a method for secretly sharing and restoring digital images, which comprises the following steps of: (1) constructing an RS (Reed-solomon) delete code generator matrix G(k+n)*k; (2) initializing n sets of v1, v2, ^ and vn, and meanwhile, endowing a unique number di=I to the set vi, wherein i is more than or equal to 1 and less than or equal to n; (3) in a certain sequence, successively taking k pixel points which are not subjected to sharing operation from a secrete image S, and recording as alpha k*1=(a1, a2, ^, ak) gamma; (4) generating a matrix G(k+n)*k by the RS delete code to code the alpha k*1, and obtaining a code word beta, wherein beta (k+n)*1=(G(k+n)*k.alpha k*1)mod 251; (5) successively putting the last n elements (bk+1, bk+2, ^ and bk+n) in the generated code word vector beta into the sets of v1, v2, ^ and vn in sequence; (6) judging whether all pixel points in the secret image S are processed or not; if yes, entering step (7), and otherwise returning to the step (3); and (7) randomly selecting n images to serve as cover images, and respectively embedding data in the sets of v1, v2, ^ and vn into n cover images to obtain final n shadow images Y1, Y2, ^ and Yn. Compared with the prior art, the method disclosed by the invention has low computational complexity, and the use ratio of storage and transmission is effectively improved.

Description

A kind of digital picture secret sharing and restoration methods
Technical field
The present invention relates to image information concealing technology field, particularly relate to a kind of digital picture secret sharing and restoration methods.
Background technology
Compare the numerical information of many other types; Digital picture becomes the important means of expressing information in the network because of its characteristics such as lively, directly perceived; Possibly comprise in the image and a large amount of relate to safe sensitive information and can not directly transmit, need carry out just preventing after the encryption leakage of secret information these information.Can protect the validity of digital picture, assurance not to be intercepted and captured and distort through image secret sharing scheme through the information of Digital Image Transmission.(specifically see Chang-Chou Lin by Taiwan's scholars Chang-Chou Lin and Wen-Hsiang Tsai; Wen-Hsiang Tsai.Seeret image sharing with steganography and authentication [J] .The Journal of system and software; 2004 (73): a kind of digital picture secret sharing scheme that 405-414) proposes; This scheme has realized the (k of gray level image; N) thresholding, but this scheme can not accurately be recovered Secret Image and in storage and transmission, all exist great waste.
Summary of the invention
To the problem that prior art exists, fundamental purpose of the present invention is to provide a kind of digital picture secret sharing and restoration methods, only need obtain the shadow image that wherein is partially submerged into Secret Image and can accurately recover Secret Image file originally.
For realizing above-mentioned purpose, the invention provides a kind of embodiment of digital picture secret sharing method, Secret Image is broken to cover in the image, this digital picture secret sharing method comprises the steps:
(1) according to the k of image secret sharing thresholding, n value, the structure RS generator matrix G that deletes code (k+n) * k
(2) initialization n set v 1, v 2, Λ, v n, give set v simultaneously iA unique numbering d i=i, wherein 1≤i≤n;
(3) from Secret Image S, take out k successively in a certain order and share the pixel of operation, note is made α K * 1=(a 1, a 2, Λ, a k) Γ
(4) utilize the RS generator matrix G that deletes code (k+n) * kTo α K * 1Carry out encoding operation, can obtain code word β, β (k+n) * 1=(G (k+n) * kα K * 1) mod 251;
(5) with last n element (b among the codeword vector β that produces K+1, b K+2, Λ, b K+n) put into successively in order and gather v 1, v 2, Λ, v nIn;
(6) judge whether all pixels among the Secret Image S all dispose, if, then get into step (7), otherwise, step (3) returned;
(7) choose n width of cloth image arbitrarily as covering image, will gather v 1, v 2, Λ, v nIn data be embedded into the n width of cloth respectively and cover in the image, obtain final n width of cloth shadow image Y 1, Y 2, Λ, Y n
The generator matrix G that deletes code of the RS in the step (1) wherein (k+n) * kPreceding k behavior one unit matrix, back n behavior one vandermonde determinant.
Step (3) can behavior be taken out the individual pixel of operation of sharing of k in proper order or to classify order as successively from Secret Image S.And when number deficiency k of the pixel of sharing operation among the Secret Image S, supply by 0.
In addition, the n width of cloth chosen of step (7) is covered image and Secret Image S has same type and size.The last d position of the n width of cloth being covered each pixel value of image hollows out, and wherein d=8/k then rounds up when d is non-integer, forms d position default map, will gather v 1, v 2, Λ, v nIn data be embedded into the n width of cloth respectively and cover the default part of image.
After step (7) forms n width of cloth shadow image, can former Secret Image file be destroyed.
After using above-mentioned digital picture secret sharing method to share Secret Image; The present invention also provides a kind of secret restoration methods of digital picture that the Secret Image of sharing is recovered; This Secret Image forms the shadow image after embedding and covering image; Use at least k shadow image can recover the former Secret Image of sharing (when the quantity of shadow image then can not recover the former Secret Image of sharing during less than k), 2≤k≤n wherein, the secret restoration methods of this digital picture comprises the steps:
(1) S set of a sky of structure;
(2) from k width of cloth shadow image, extract original share data, constitute the k data sets, note is made v ' 1, v ' 2, Λ, v ' k, will gather v ' 1, v ' 2, Λ, v ' kNumbering note make d ' 1, d ' 2, Λ, d ' k
(3) with data acquisition v ' 1, v ' 2, Λ, v ' kArrange according to numbering order from small to large, the share data note after arranging is again made v 1, v 2, Λ, v k, the corresponding numbering note in ordering back is made d 1, d 2, Λ, d k
(4) matrix D of structure ' K * k, with the delete code d of generator matrix G of RS iThe row assignment is given D ' K * kI capable, 1≤i≤n wherein;
(5) with matrix D ' K * kCarry out 251 modular arithmetic after inverting and obtain check matrix D K * k
(6) respectively from each share data acquisition v 1, v 2, Λ, v kIn take out a numerical value in order, arrange to constitute vectorial β according to the order of sequence K * 1=(b 1, b 2, Λ, b k);
(7) α=(D β) mod 251, note is made α K * 1=(a 1, a 2, Λ, a k);
K element (a among the vectorial α that (8) will calculate 1, a 2, Λ, a k) put into S set in order;
(9) judge share data acquisition v 1, v 2, Λ, v kIn all data whether all dispose, if, then get into step (10), if not, then return step (6);
(10) the former Secret Image file shared of S set for recovering to obtain.
The present invention is with respect to prior art; Secret Image to be shared is passed through certain computing of sharing; To share Secret Image after the computing and be stored in n respectively and cover in the image, only need obtain wherein the Secret Image file that k shadow image can recover script fully.And this method computation complexity is low, effectively raises the utilization factor of storage and transmission.
Description of drawings
Fig. 1 is the process flow diagram of the embodiment of digital picture secret sharing method of the present invention
Fig. 2 is the process flow diagram of the embodiment of the secret restoration methods of digital picture of the present invention
Embodiment
Below in conjunction with accompanying drawing, specify embodiment of the present invention.
Specify digital picture secret sharing method of the present invention below in conjunction with Fig. 1.Fig. 1 is the process flow diagram of the embodiment of digital picture secret sharing method of the present invention.This digital picture secret sharing method comprises the steps:
S11, according to the k of image secret sharing thresholding, n value, the structure RS generator matrix G that deletes code (k+n) * k, the RS generator matrix G that deletes code (k+n) * kPreceding k behavior one unit matrix, back n behavior one vandermonde determinant,
G ( k + n ) × k = 1 0 0 Λ 0 0 1 0 Λ 0 M M M O M 0 0 0 Λ 1 d k + 1,1 d k + 1,2 d k + 1,3 Λ d k + 1 , k d k + 2,1 d k + 2,2 d k + 2 , 3 Λ d k + 2,4 M M M O M d k + n , 1 d k + n , 2 d k + n , 3 Λ d k + n , k ;
S12, an initialization n set v 1, v 2, Λ, v n, be about to this n set v 1, v 2, Λ, v nAssignment is empty, gives set v simultaneously iA unique numbering d i=i, wherein 1≤i≤n;
S13, from Secret Image S, take out k successively in a certain order and share the pixel of operation, note is made α K * 1=(a 1, a 2, Λ, a k) гCan be with the behavior order or classifying order as, and when number deficiency k of the pixel of sharing operation among the Secret Image S, supply by 0;
S14, utilize the RS generator matrix G that deletes code (k+n) * kTo α K * 1Carry out encoding operation, can obtain code word β, wherein β (k+n) * 1=(G (k+n) * kα K * 1) mod 251, preceding k the component of code word β and α K * 1Identical;
S15, with last n element (b among the codeword vector β that produces K+1, b K+2, Λ, b K+n) put into successively in order and gather v 1, v 2, Λ, v nIn;
S16, judge whether all pixels among the Secret Image S all dispose, if, then get into step S17, otherwise, step S13 returned;
S17, choose n width of cloth image as covering image arbitrarily, will gather v 1, v 2, Λ, v nIn data be embedded into the n width of cloth respectively and cover in the image, obtain final n width of cloth shadow image Y 1, Y 2, Λ, Y nThe n width of cloth of choosing covers image and Secret Image S has same type and size.The last d position of the n width of cloth being covered each pixel value of image hollows out, and wherein d=8/k then rounds up when d is non-integer, forms d position default map.Because a width of cloth digital picture all is made up of pixel value, the last d place value of each pixel value is removed and when forming d position default map, when d<4, visually be difficult to find out variation.To gather v 1, v 2, Λ, v nIn data be embedded into the n width of cloth respectively and cover the default part of image, be about to gather V 1In data embed the default part cover image 1, form shadow image Y 1, by that analogy.When embedding, each data is divided into several parts in the default position of respectively covering image,,, then need data be split as 4 parts and be embedded into respectively in a certain 4 default positions of covering image if d is 2 o'clock as 73 being 01001001.
Secret Image that will be to be shared through above step is embedded into fully and covers in the image, forms n width of cloth shadow image, and can destroy former Secret Image this moment.
After using above-mentioned digital picture secret sharing method to share Secret Image; The present invention also provides a kind of secret restoration methods of digital picture that the Secret Image of sharing is recovered; This Secret Image forms the shadow image after embedding and covering image; Use at least k shadow image can recover the former Secret Image of sharing (when the quantity of shadow image then can not recover the former Secret Image of sharing during less than k); Wherein 2≤k≤n specifies the secret restoration methods of digital picture of the present invention below in conjunction with Fig. 2.
Fig. 2 is the process flow diagram of the embodiment of the secret restoration methods of digital picture of the present invention, specifically comprises following steps:
The S set of S21, a sky of structure;
S22, from k width of cloth shadow image, extract original share data, constitute the k data sets, note is made v ' 1, v ' 2, Λ, v ' k, will gather v ' 1, v ' 2, Λ, v ' kNumbering note make d ' 1, d ' 2, Λ, d ' k
S23, with data acquisition v ' 1, v ' 2, Λ, v ' kArrange according to numbering order from small to large, the share data note after arranging is again made v 1, v 2, Λ, v k, the corresponding numbering note in ordering back is made d 1, d 2, Λ, d k
S24, matrix D of structure ' K * k, with the delete code d of generator matrix G of RS iThe row assignment is given D ' K * kI capable, 1≤i≤n wherein;
S25, with matrix D ' K * kCarry out 251 modular arithmetic after inverting and obtain check matrix D K * k
S26, respectively from each share data acquisition v 1, v 2, Λ, v kIn take out a numerical value in order, arrange to constitute vectorial β according to the order of sequence K * 1=(b 1, b 2, Λ, b k);
S27, α=(D β) mod 251, note is made α K * 1=(a 1, a 2, Λ, a k);
K element (a among S28, the vectorial α that will calculate 1, a 2, Λ, a k) put into S set in order, this order is corresponding with the order of taking-up pixel among the digital picture secret sharing method S13, if S13 takes out pixel in turn by behavior, then k element is put into S set by the behavior order here;
S29, judgement share data acquisition v 1, v 2, Λ, v kIn all data whether all dispose, if, then get into step S30, if not, then return step S26;
S30, the former Secret Image file shared of S set for recovering to obtain.
Certainly, just list above to have lifted and utilize k shadow image to recover the method for Secret Image, when shadow picture number during greater than k, identical method also capable of using is recovered.
Embodiment 1
If the quantity L of the pixel of Secret Image to be stored is 18, image pixel value is 8 bits, so the pixel value scope of each pixel is 0~255.If the pixel value of each pixel of Secret Image S to be covered is following:
3 10 15 60 20 36 60 3 70
30 78 90 66 99 160 15 254 10
Choose image that the n=5 width of cloth and Secret Image S have same type (being jpeg like image type) and a size arbitrarily as covering image, make and to recover Secret Image file originally when obtaining k=3 width of cloth shadow image.
Utilize digital picture secret sharing method of the present invention that the Secret Image of 18 pixels is embedded into 5 width of cloth and cover in the image, implementation method is following:
(1) by the k of image secret sharing thresholding, n value, the structure RS generator matrix G that deletes code (k+n) * k, i.e. G (3+5) * 3, delete code preceding 3 behaviors, one unit matrix of generator matrix, then 5 behaviors, one vandermonde determinant of RS wherein.By k=3, n=5 confirms that this RS generator matrix that deletes code is:
G ( 3 + 5 ) × 3 = 1 0 0 0 1 0 0 0 1 1 0 2 0 3 0 1 1 2 1 3 1 1 2 2 2 3 2 1 3 2 3 3 3 1 4 2 4 3 4 ;
(2) 5 set of initialization v 1, v 2, Λ v 5, it is empty being about to these 5 aggregate assignments;
(3) take out 3 pixel values of sharing with the behavior order from Secret Image,, be designated as as 3,10,15 α 3 × 1 = 3 10 15 , Certainly, also can classify order as;
(4) utilize RS to delete code generator matrix to array of pixel values α 3 * 1Carry out encoding operation and generate β (3+5) * 1, promptly
β ( 3 + 5 ) × 1 = ( G ( 3 + 5 ) × 3 · α 3 × 1 ) mod 251 = 3 10 15 28 68 178 237 123 ;
(5) remove 3 elements identical in front, last 5 elements of the code word β that produces are put into initialized 5 set v successively with α 1, v 2, Λ v 5In, i.e. v 1=28, v 2=68, v 3=178, v 4=237, v 5=123;
(6) repeating step 3 to 5, and all pixels in Secret Image all dispose, and last pixel is 15,254,10 in the present embodiment.Each gathers v like this 1, v 2, Λ v 5In all contain L/3=6 element value;
(7) choose the image V ' that 5 width of cloth have vision content at random and have same type and size with Secret Image arbitrarily 1, V ' 2, Λ V ' 5As covering image, last with each pixel value in this 5 width of cloth image
Figure BDA0000080011120000082
Position (number that rounds up is 3) hollows out, and forms d position default map.With 5 set v 1, v 2, Λ v 5Interior element embeds the default part that 5 width of cloth are covered image successively, is about to v iElement insert and cover image V ' i3 default parts in, by that analogy, so obtain 5 width of cloth shadow image Y 1, Y 2Λ Y 5At last former Secret Image is destroyed.
Introduce the method for using k=3 width of cloth shadow image that the former Secret Image of sharing is recovered below, suppose remaining shadow image Y 1, Y 2, Y 3:
(1) S set of a sky of structure;
(2) from 3 width of cloth shadow images, take out primitive element successively, obtain share data acquisition v 1, v 2, v 3Be about to shadow image Y 1In element store into the set v 1, with shadow image Y 2In element store v into 2In, with shadow image Y 3In element store into the set v 3In, each gathers v 1, v 2, v 3In all contain 6 element values;
(3) come structural matrix D ' according to the numbering of shadow image K * k, promptly In the present embodiment shadow image be numbered 1,2,3, then the capable assignment of 3+1 of generator matrix G is given
Figure BDA0000080011120000091
The 1st the row, the capable assignment of 3+2 of generator matrix G is given
Figure BDA0000080011120000092
The 2nd the row, the capable assignment of 3+3 of generator matrix G is given
Figure BDA0000080011120000093
The 3rd the row, obtain matrix D 3 × 3 ′ = 1 0 2 0 3 0 1 1 2 1 3 1 1 2 2 2 3 3 . Ask matrix D ' 3 * 3The inverse matrix of modular arithmetic (mod 251) obtains D 3 × 3 = 3 123 126 248 4 250 1 124 126 ;
(4) successively from share data acquisition v 1, v 2, v 3In take out an element, promptly 28,68,178, obtain vector β 3 × 1 = 28 68 178 ;
(5) α 3 × 1 = ( D 3 × 3 × β 3 × 1 ) Mod 251 = 3 10 15 , Be the pixel value of corresponding original Secret Image;
(6) with vector value α 3 * 1Put into S set successively with the behavior order;
(7) repeating step 4 is finished by calculating up to all data to step 6.
S set is the former Secret Image file of sharing that recovery obtains.
More than introduce digital picture secret sharing method, Secret Image has been broken to cover in the image, introduced the secret restoration methods of digital picture that the Secret Image that will share is recovered simultaneously.But the present invention is not limited to above embodiment, does not anyly break away from technical scheme of the present invention, promptly only it is carried out improvement or the change that those of ordinary skills knew, all belongs within protection scope of the present invention.

Claims (8)

1. digital picture secret sharing method breaks Secret Image to and to cover in the image, it is characterized in that said digital picture secret sharing method comprises the steps:
(1) according to the k of image secret sharing thresholding, n value, the structure RS generator matrix G that deletes code (k+n) * k
(2) initialization n set v 1, v 2, Λ, v n, give set v simultaneously iA unique numbering d i=i, wherein 1≤i≤n;
(3) from Secret Image S, take out k successively in a certain order and share the pixel of operation, note is made α K * 1=(a 1, a 2, Λ, α k) Γ
(4) utilize the RS generator matrix G that deletes code (k+n) * kTo α K * 1Carry out encoding operation, can obtain code word β, β (k+n) * 1=(G (k+n) kα K * 1) mod 251.
(5) with last n element (b among the codeword vector β that produces K+1, b K+2, Λ, b K+n) put into successively in order and gather v 1, v 2, Λ, v nIn;
(6) judge whether all pixels among the Secret Image S all dispose, if, then get into step (7), otherwise, step (3) returned;
(7) choose n width of cloth image as covering image, will gather v 1, v 2, Λ, v nIn data be embedded into the n width of cloth respectively and cover in the image, obtain final n width of cloth shadow image Y 1, Y 2, Λ, Y n
2. digital picture secret sharing method according to claim 1 is characterized in that, the said RS generator matrix G that deletes code (k+n) * kPreceding k behavior one unit matrix, back n behavior one vandermonde determinant.
3. digital picture secret sharing method according to claim 1 is characterized in that, said step (3) can behavior be taken out the individual pixel of operation of sharing of k in proper order or to classify order as successively from Secret Image S.
4. digital picture secret sharing method according to claim 3 is characterized in that, when number deficiency k of the pixel of sharing operation among the Secret Image S, supplies by 0 in the said step (3).
5. according to the arbitrary described digital picture secret sharing method of claim 1~4, it is characterized in that the n width of cloth that said step (7) is chosen covers image and Secret Image S has same type and size.
6. digital picture secret sharing method according to claim 5 is characterized in that, the last d position that said step (7) is covered the n width of cloth each pixel value of image hollows out, and wherein d=8/k then rounds up when d is non-integer, forms d position default map, will gather v 1, v 2, Λ, v nIn data be embedded into the n width of cloth respectively and cover the default part of image.
7. digital picture secret sharing method according to claim 6 is characterized in that, after step (7) forms n width of cloth shadow image, can former Secret Image file be destroyed.
8. the secret restoration methods of digital picture recovered of the Secret Image that the described digital picture secret sharing of claim 1 method is shared; Said Secret Image forms the shadow image after embedding and covering image; Using at least, k shadow image can recover the former Secret Image of sharing; It is characterized in that the secret restoration methods of said digital picture comprises the steps:
(1) S set of a sky of structure;
(2) from k width of cloth shadow image, extract original share data, constitute the k data sets, note is made v ' 1, v ' 2, Λ, v ' n, will gather v ' 1, v ' 2, Λ, v ' kNumbering note make d ' 1, d ' 2, Λ, d ' k
(3) with data acquisition v ' 1, v ' 2, Λ, v ' kArrange according to numbering order from small to large, the share data note after arranging is again made v 1, v 2, Λ, v k, the corresponding numbering note in ordering back is made d 1, d 2, Λ, d k
(4) matrix D of structure ' K * k, with the delete code d of generator matrix G of RS iThe row assignment is given D ' K * kI capable, 1≤i≤n wherein;
(5) with matrix D ' K * kCarry out 251 modular arithmetic after inverting and obtain check matrix D K * k
(6) respectively from each share data acquisition v 1, v 2, Λ, v kIn take out a numerical value in order, arrange to constitute vectorial β according to the order of sequence K * 1=(b 1, b 2, Λ, b k);
(7) α=(D β) mod 251, note is made α K * 1=(a 1, a 2, Λ, a k);
K element (a among the vectorial α that (8) will calculate 1, a 2, Λ, a k) put into S set in order;
(9) judge share data acquisition v 1, v 2, Λ, v kIn all data whether all dispose, if, then get into step (10), if not, then return step (6);
(10) the former Secret Image file shared of S set for recovering to obtain.
CN 201110216491 2011-07-30 2011-07-30 Method for secretly sharing and restoring digital image Active CN102426690B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110216491 CN102426690B (en) 2011-07-30 2011-07-30 Method for secretly sharing and restoring digital image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110216491 CN102426690B (en) 2011-07-30 2011-07-30 Method for secretly sharing and restoring digital image

Publications (2)

Publication Number Publication Date
CN102426690A true CN102426690A (en) 2012-04-25
CN102426690B CN102426690B (en) 2013-08-07

Family

ID=45960669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110216491 Active CN102426690B (en) 2011-07-30 2011-07-30 Method for secretly sharing and restoring digital image

Country Status (1)

Country Link
CN (1) CN102426690B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544674A (en) * 2013-10-16 2014-01-29 大连理工大学 Method for progressively encrypting and sharing secrete images on basis of Sudoku
CN103761702A (en) * 2014-01-09 2014-04-30 太原科技大学 Image hiding and authentication method based on secret sharing
CN105468985A (en) * 2015-12-01 2016-04-06 桂林电子科技大学 Secret image segmentation protection method
CN105917400A (en) * 2014-01-17 2016-08-31 日本电信电话株式会社 Element replication device, element replication method, and program
CN106339975A (en) * 2016-10-10 2017-01-18 中科院成都信息技术股份有限公司 Digital image secret sharing method, restoration method and devices
CN107591192A (en) * 2017-05-10 2018-01-16 西华大学 Improve picture quality and point method for depositing display Image of Meaningful
CN109003218A (en) * 2018-06-13 2018-12-14 成都信息工程大学 A method of construction thresholding visual cryptography matrix
CN110278074A (en) * 2018-03-16 2019-09-24 临沂大学 A kind of visualization secret sharing scheme for Image Sharing encryption
CN110390623A (en) * 2019-07-19 2019-10-29 成都信息工程大学 A kind of image media safety certification restoration methods based on secret sharing
CN110602349A (en) * 2019-08-27 2019-12-20 成都信息工程大学 Method for security protection of associated image content
CN111416915A (en) * 2020-02-21 2020-07-14 成都信息工程大学 Image secret sharing method based on threshold reduction and application
CN111444521A (en) * 2020-02-21 2020-07-24 成都信息工程大学 Image secret sharing method based on threshold increase and digital signature system
CN112235481A (en) * 2020-11-11 2021-01-15 成都信息工程大学 Novel high-security image secret sharing method
CN113141254A (en) * 2021-06-22 2021-07-20 成都信息工程大学 High-adaptability secret image sharing method
CN114612317A (en) * 2022-02-07 2022-06-10 中国人民解放军国防科技大学 Secret image sharing method and system for resisting mean filtering

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872617A (en) * 2010-05-19 2010-10-27 中科院成都信息技术有限公司 Method for sharing and recovering digital audio secrete

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872617A (en) * 2010-05-19 2010-10-27 中科院成都信息技术有限公司 Method for sharing and recovering digital audio secrete

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TANGDAN, ET AL.: "Image Encryption Based on Bivariate Polynomials", 《2008 INTERNATION CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING》 *
吴海佳等: "基于RS纠删码的信息分散算法", 《计算机应用》 *
郭锐: "图像秘密共享应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544674B (en) * 2013-10-16 2016-04-06 大连理工大学 A kind of based on several only gradual Secret Image encryption sharing method
CN103544674A (en) * 2013-10-16 2014-01-29 大连理工大学 Method for progressively encrypting and sharing secrete images on basis of Sudoku
CN103761702A (en) * 2014-01-09 2014-04-30 太原科技大学 Image hiding and authentication method based on secret sharing
CN103761702B (en) * 2014-01-09 2017-01-11 太原科技大学 Image hiding and authentication method based on secret sharing
CN105917400A (en) * 2014-01-17 2016-08-31 日本电信电话株式会社 Element replication device, element replication method, and program
CN105917400B (en) * 2014-01-17 2019-03-15 日本电信电话株式会社 Element reproducing unit, element clone method and recording medium
CN105468985B (en) * 2015-12-01 2018-07-03 桂林电子科技大学 Secret Image division protection method
CN105468985A (en) * 2015-12-01 2016-04-06 桂林电子科技大学 Secret image segmentation protection method
CN106339975A (en) * 2016-10-10 2017-01-18 中科院成都信息技术股份有限公司 Digital image secret sharing method, restoration method and devices
CN107591192A (en) * 2017-05-10 2018-01-16 西华大学 Improve picture quality and point method for depositing display Image of Meaningful
CN110278074A (en) * 2018-03-16 2019-09-24 临沂大学 A kind of visualization secret sharing scheme for Image Sharing encryption
CN110278074B (en) * 2018-03-16 2022-11-11 临沂大学 Visual secret sharing method for image encryption
CN109003218A (en) * 2018-06-13 2018-12-14 成都信息工程大学 A method of construction thresholding visual cryptography matrix
CN110390623A (en) * 2019-07-19 2019-10-29 成都信息工程大学 A kind of image media safety certification restoration methods based on secret sharing
CN110390623B (en) * 2019-07-19 2023-03-24 成都信息工程大学 Secret sharing-based image media security authentication recovery method
CN110602349B (en) * 2019-08-27 2021-07-02 成都信息工程大学 Method for security protection of associated image content
CN110602349A (en) * 2019-08-27 2019-12-20 成都信息工程大学 Method for security protection of associated image content
CN111416915A (en) * 2020-02-21 2020-07-14 成都信息工程大学 Image secret sharing method based on threshold reduction and application
CN111444521A (en) * 2020-02-21 2020-07-24 成都信息工程大学 Image secret sharing method based on threshold increase and digital signature system
CN111444521B (en) * 2020-02-21 2023-09-01 成都信息工程大学 Image secret sharing method based on threshold increase and digital signature system
CN112235481A (en) * 2020-11-11 2021-01-15 成都信息工程大学 Novel high-security image secret sharing method
CN113141254A (en) * 2021-06-22 2021-07-20 成都信息工程大学 High-adaptability secret image sharing method
CN113141254B (en) * 2021-06-22 2021-09-24 成都信息工程大学 High-adaptability secret image sharing method
CN114612317A (en) * 2022-02-07 2022-06-10 中国人民解放军国防科技大学 Secret image sharing method and system for resisting mean filtering

Also Published As

Publication number Publication date
CN102426690B (en) 2013-08-07

Similar Documents

Publication Publication Date Title
CN102426690B (en) Method for secretly sharing and restoring digital image
Yang et al. Improving stego image quality in image interpolation based data hiding
Chang et al. A secure fragile watermarking scheme based on chaos-and-hamming code
CN104200424B (en) Difference conversion based (K, N) meaningful image sharing and recovering method
CN105404817B (en) It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding
Goli et al. Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku
Lin et al. Dual digital watermarking for internet media based on hybrid strategies
CN107845118B (en) Data image processing method
Bhautmage et al. Advanced video steganography algorithm
CN112261240A (en) Hyperchaotic system image encryption method based on spiral scrambling
Yang et al. Tampering detection and content recovery for digital images using halftone mechanism
Yampolskiy et al. Password protected visual cryptography via cellular automaton rule 30
Jithi et al. Progressive visual cryptography with watermarking for meaningful shares
CN110264390A (en) A kind of digital watermark method based on double watermarks insertion
KR101797030B1 (en) Apparatus and method for processing image steganography using random permutation and difference of image
CN104702814B (en) (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods
CN108171665B (en) Multi-version backup and restrictive dual authentication master key (t, s, k, n) image separate storage method
CN105279728A (en) Intelligent mobile terminal image steganography method based on secret information encryption pretreatment
CN109543425A (en) A kind of Image Data Hiding Methods based on tensor resolution
CN106339975A (en) Digital image secret sharing method, restoration method and devices
CN113570494A (en) Encrypted digital watermark adding method, system, equipment and storage medium
CN111583101B (en) Image anti-theft system and method based on deep learning
Elshazly et al. FPGA implementation of image steganography algorithms using generalized exploiting modification direction and pixel segmentation strategy
CN109920015B (en) Image visual meaningful encryption method based on fractal graph generation
Banu et al. Secure reversible data hiding technique on textures using double encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 610225, No. 24, Section 1, Xuefu Road, Southwest Economic Development Zone, Chengdu, Sichuan

Patentee after: CHENGDU University OF INFORMATION TECHNOLOGY

Address before: 610225, No. 24, Section 1, Xuefu Road, Southwest Economic Development Zone, Chengdu, Sichuan

Patentee before: Chengdu University of Information Technology

CP01 Change in the name or title of a patent holder